Location Tracking Attack in Ad hoc Networks based on Topology Information

S. Chapkin, B. Bako, F. Kargl, E. Schoch
{"title":"Location Tracking Attack in Ad hoc Networks based on Topology Information","authors":"S. Chapkin, B. Bako, F. Kargl, E. Schoch","doi":"10.1109/MOBHOC.2006.278667","DOIUrl":null,"url":null,"abstract":"Unlike in conventional networks, node positions in mobile ad hoc networks (MANETs) usually change over time. As a side effect of managing routes, routing protocols to some extent also disseminate neighborship and topology information in the network, thereby disclosing at least some information on a node's own position to other nodes. Due to the wireless nature of ad hoc networks, this information can become available even to third parties which are not participating in the network. Using this information, location profiling may become possible, where attackers gather information on node positions or mobility patterns. This information may then be used for anything ranging from targeted advertisement to criminal activities. Therefore, location privacy is an important issue in ad hoc networks. In this paper, we analyze to what extent an attacker can track the precise location of a node, assuming a powerful attacker model where an attacker knows all neighbor relationships plus information on node distances. We present a new approach which uses these information and uses geometric constraints and heuristics to find node positions efficiently. The quality of our results is discussed and compared to other approaches. Based on the localization precision that such an \"omniscient\" attacker can reach, we will be able to evaluate the quality of future, more realistic attack models","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MOBHOC.2006.278667","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Unlike in conventional networks, node positions in mobile ad hoc networks (MANETs) usually change over time. As a side effect of managing routes, routing protocols to some extent also disseminate neighborship and topology information in the network, thereby disclosing at least some information on a node's own position to other nodes. Due to the wireless nature of ad hoc networks, this information can become available even to third parties which are not participating in the network. Using this information, location profiling may become possible, where attackers gather information on node positions or mobility patterns. This information may then be used for anything ranging from targeted advertisement to criminal activities. Therefore, location privacy is an important issue in ad hoc networks. In this paper, we analyze to what extent an attacker can track the precise location of a node, assuming a powerful attacker model where an attacker knows all neighbor relationships plus information on node distances. We present a new approach which uses these information and uses geometric constraints and heuristics to find node positions efficiently. The quality of our results is discussed and compared to other approaches. Based on the localization precision that such an "omniscient" attacker can reach, we will be able to evaluate the quality of future, more realistic attack models
基于拓扑信息的Ad hoc网络位置跟踪攻击
与传统网络不同,移动自组网(manet)中的节点位置通常会随时间变化。路由协议作为路由管理的一个副作用,在一定程度上也传播了网络中的邻居关系和拓扑信息,从而至少向其他节点泄露了一些关于节点自身位置的信息。由于自组织网络的无线特性,这些信息甚至可以提供给没有参与网络的第三方。使用这些信息,可以对位置进行分析,攻击者可以收集节点位置或移动模式的信息。然后,这些信息可能被用于从定向广告到犯罪活动的任何事情。因此,位置隐私是ad hoc网络中的一个重要问题。在本文中,我们分析了攻击者可以在多大程度上跟踪节点的精确位置,假设一个强大的攻击者模型,攻击者知道所有的邻居关系和节点距离信息。我们提出了一种利用这些信息,并利用几何约束和启发式方法有效地寻找节点位置的新方法。讨论了我们结果的质量,并与其他方法进行了比较。基于这种“全知”攻击者所能达到的定位精度,我们将能够评估未来更现实的攻击模型的质量
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信